Volt Typhoon (Insidious Taurus) Threat Actor
Volt Typhoon has been active since at least 2021 and primarily targets U.S government and defense organizations for intelligence-gathering purposes.
Volt Typhoon has been active since at least 2021 and primarily targets U.S government and defense organizations for intelligence-gathering purposes.
This vulnerability, labeled CVE-2024-23625 on January 26, 2024, targets D-Link DAP-1650 devices, exposing them to a critical risk.
Chinese state-sponsored hacking group, Volt Typhoon, is reportedly targeting end-of-life Cisco routers and network devices in the U.S., U.K., and Australia.
A recently identified Mirai-based malware botnet named 'InfectedSlurs' has been utilizing two zero-day vulnerabilities to infiltrate routers and NVR devices.
A recent discovery by VulnCheck has shed light on a severe vulnerability affecting industrial cellular routers produced by Milesight.
Three high-end ASUS router models, are facing a critical security threat due to three remote code execution vulnerabilities.
MikroTik routers, highly targeted by threat actors, are at risk due to a privilege escalation vulnerability (CVE-2023-30788) in the RouterOS operating system
Lumen Black Lotus Labs has uncovered a sophisticated hacking campaign involving the AVrecon malware, which specifically targets small office/home office
ASUS has released a new firmware update for multiple router models, addressing nine security vulnerabilities, including high and critical ones.
A new RAT called GobRAT has been discovered, targeting Linux routers in Japan. The attack begins by exploiting vulnerabilities in routers.